魔盾安全分析报告 文件详细信息 特征
Transcription
魔盾安全分析报告 文件详细信息 特征
魔盾安全分析报告 分析类型 开始时间 结束时间 持续时间 分析引擎版本 FILE 2016-05-17 13:14:09 2016-05-17 13:16:46 157 秒 1.4-Maldun 虚拟机机器名 标签 虚拟机管理 开机时间 关机时间 win7-sp1-x64-1 win7-sp1-x64-1 KVM 2016-05-17 13:14:09 2016-05-17 13:16:46 魔盾分数 10.0 Zegost 文件详细信息 文件名 server.exe 文件大小 159288 字节 文件类型 PE32 executable (GUI) Intel 80386, for MS Windows CRC32 76812114 MD5 fa4955c02390830b26e82cbae5ed66f6 SHA1 68b964e340cb29fb8c94e12a7bf0265e1085d581 SHA256 e110990a7f629e6c0f77ce1909a9ec0a9978f58f754975619bcdaa62b72c29c5 SHA512 4ed0663068126c941ee2eee363abd71520611e62f80bd806634207f3fce099f4046a961161f16877f78b094f72780a339ced3af44a02ca96deef26f572ea8207 Ssdeep 3072:AfPh6t5HWqv0yxmktUXoqRA8F2CfOgiI121a+FA:OE0AmktUXTFF2EOgV121j PEiD 无匹配 Yara 无Yara规则匹配 VirusTotal VirusTotal链接 VirusTotal扫描时间: 2016-05-16 12:49:51 扫描结果: 46/57 特征 提供一个Authenticode数字签名 md5_fingerprint: 242913a2a31bad3bc7f08e547e0bbfad sha1_fingerprint: 2fdd445591cd2eedbef8b8a281896a59c08b3dc9 sn: 150788145857946049648934408799086261262 cn: Tencent Technology(Shenzhen) Company Limited 投放出一个二进制文件并执行它 binary: C:\ProgramData\Microsoft\Mxzwq\kvrjlf.exe 发起了一些HTTP请求 url: http://ocsp.verisign.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCEFIA5aolVvwahu2WydRLM8c%3D url: http://ocsp.verisign.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTSqZMG5M8TA9rdzkbCnNwuMAd5VgQUz5mp6nsm9EvJjo%2FX8AUm7%2BPSp50CEHFwvZPPPxia5kUrUUxJNA4%3D url: http://csc3-2010-crl.verisign.com/CSC3-2010.crl 强制将一个创建的进程加载为另一个不相关进程的子进程 从磁盘上删除自身的原始二进制 将自己装载到Windows开机自动启动项目 service name: Ghijkl Nopqrstu Wxy service path: C:\ProgramData\Microsoft\Mxzwq\kvrjlf.exe 文件已被至少十个VirusTotal上的反病毒引擎检测为病毒 Bkav: W32.Clodd94.Trojan.729b MicroWorld-eScan: Gen:Variant.Symmi.49705 CAT-QuickHeal: Backdoor.Zegost.018629 ALYac: Gen:Variant.Symmi.49705 Zillya: Backdoor.Zegost.Win32.3529 TheHacker: Trojan/Farfli.boa K7GW: Riskware ( 0040eff71 ) K7AntiVirus: Riskware ( 0040eff71 ) Baidu: Win32.Trojan.WisdomEyes.151026.9950.9982 Cyren: W32/Trojan.EVTB-7767 ESET-NOD32: Win32/Farfli.BOA TrendMicro-HouseCall: BKDR_ZEGOST.SM01 Avast: Win32:Malware-gen GData: Gen:Variant.Symmi.49705 Kaspersky: Backdoor.Win32.Zegost.dgrp BitDefender: Gen:Variant.Symmi.49705 NANO-Antivirus: Trojan.Win32.Zegost.dqwfmx AegisLab: Backdoor.W32.Zegost!c Tencent: Win32.Trojan.Falsesign.Ednl Ad-Aware: Gen:Variant.Symmi.49705 Emsisoft: Gen:Variant.Symmi.49705 (B) Comodo: TrojWare.Win32.Farfli.LK F-Secure: Gen:Variant.Symmi.49705 DrWeb: Trojan.DownLoader12.63145 VIPRE: Trojan.Win32.Generic!BT TrendMicro: BKDR_ZEGOST.SM01 McAfee-GW-Edition: GenericR-DZQ!FA4955C02390 Sophos: Troj/Zegost-GO F-Prot: W32/Trojan2.OPOR Jiangmin: Backdoor/Zegost.cqo Avira: TR/Crypt.XPACK.Gen7 Antiy-AVL: Trojan[Backdoor]/Win32.Zegost.dgrp Arcabit: Trojan.Symmi.DC229 Microsoft: Backdoor:Win32/Zegost.BW AhnLab-V3: Backdoor/Win32.Agent McAfee: GenericR-DZQ!FA4955C02390 AVware: Trojan.Win32.Generic!BT VBA32: Backdoor.Zegost Baidu-International: Backdoor.Win32.Zegost.dgrp Rising: Backdoor.Zegost!8.177-5HcJEr5OzXH (Cloud) Yandex: Backdoor.Zegost!a7VM0k0YXN8 Ikarus: Trojan.Win32.Farfli Fortinet: W32/Farfli.BBB!tr AVG: BackDoor.Generic18.CBEX Panda: Trj/CI.A Qihoo-360: Backdoor.Win32.Gh0st.KS 生成一个自己的复制文件 copy: C:\ProgramData\Microsoft\Mxzwq\kvrjlf.exe 运行截图 网络分析 访问主机记录 直接访问 IP地址 国家名 否 23.44.155.27 United States 否 23.44.149.163 United States 域名解析 域名 响应 ocsp.verisign.com CNAME ocsp-ds.ws.symantec.com.edgekey.net CNAME e8218.dscb1.akamaiedge.net A 23.44.155.27 csc3-2010-crl.verisign.com A 23.44.149.163 CNAME e6845.dscb1.akamaiedge.net CNAME crl-ds.ws.symantec.com.edgekey.net TCP连接 IP地址 端口 23.44.149.163 80 23.44.155.27 80 UDP连接 IP地址 端口 192.168.122.1 53 192.168.122.1 53 192.168.122.1 53 192.168.122.255 138 HTTP请求 URL http://ocsp.verisign.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCEFIA5aolVvwahu2WydRLM8c%3D HTTP 数据 GE T/ MF Ew Tz BN ME sw ST AJB gU rD gM CG gU AB BS 56 bK HA oU D% 2B Oyl %2 B0 Lh Pg 9Jx yQ m4 gQ Uf 9Nl p8 Ld 7L vw MA nz Qz n6 Aq 8z MT MC EFI A5 aol Vv wa hu 2W yd RL M8 c% 3D HT TP/ 1.1 Co nn ect ion :K ee p-A liv e Ac ce pt: */* Us erAg ent :M icr os oft -Cr ypt oA PI/ 6.1 Ho st: ocs p.v eri sig n.c om http://ocsp.verisign.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTSqZMG5M8TA9rdzkbCnNwuMAd5VgQUz5mp6nsm9EvJjo%2FX8AUm7%2BPSp50CEHFwvZPPPxia5kUrUUxJNA4%3D GE T/ MF Ew Tz BN ME sw ST AJB gU rD gM CG gU AB BT Sq ZM G5 M8 TA 9rd zk bC nN wu MA d5 Vg QU z5 mp 6n sm 9E vJj o% 2F X8 AU m7 %2 BP Sp 50 CE HF wv ZP PP xia 5k Ur UU xJN A4 %3 D HT TP/ 1.1 Co nn ect ion :K ee p-A liv e Ac ce pt: */* Us erAg ent :M icr os oft -Cr ypt oA PI/ 6.1 Ho st: ocs p.v eri sig n.c om http://ocsp.verisign.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTSqZMG5M8TA9rdzkbCnNwuMAd5VgQUz5mp6nsm9EvJjo%2FX8AUm7%2BPSp50CEHFwvZPPPxia5kUrUUxJNA4%3D GE T/ MF Ew Tz BN ME sw ST AJB gU rD gM CG gU AB BT Sq ZM G5 M8 TA 9rd zk bC nN wu MA d5 Vg QU z5 mp 6n sm 9E vJj o% 2F X8 AU m7 %2 BP Sp 50 CE HF wv ZP PP xia 5k Ur UU xJN A4 %3 D HT TP/ 1.1 Ca ch e-C ont rol: no -ca ch e Co nn ect ion :K ee p-A liv e Pra gm a: nocac he Ac ce pt: */* Us erAg ent :M icr os oft -Cr ypt oA PI/ 6.1 Ho st: ocs p.v eri sig n.c om http://csc3-2010-crl.verisign.com/CSC3-2010.crl GE T/ CS C320 10. crl HT TP/ 1.1 Co nn ect ion :K ee p-A liv e Ac ce pt: */* Us erAg ent :M icr os oft -Cr ypt oA PI/ 6.1 Ho st: csc 3-2 01 0-c rl.v eri sig n.c om 静态分析 PE 信息 初始地址 0x00400000 入口地址 0x00402440 声明校验值 0x00000000 实际校验值 0x0002d936 最低操作系统版本要求 4.0 编译时间 2015-04-18 12:14:38 图标 图标精确哈希值 f3a24b1c0741ec88fdd56e6cf54b7268 图标相似性哈希值 68596f9ce6126103742256136f4102e9 导出DLL库名称 Install.dat 版本信息 LegalCopyright: InternalName: FileVersion: 2.00 CompanyName: UPDATE PrivateBuild: LegalTrademarks: Comments: MTT ProductName: SpecialBuild: 2.00 ProductVersion: 2.00 FileDescription: WINDOWS UPDATE OriginalFilename: Translation: 0x0804 0x04b0 PE数据组成 名称 虚拟地址 虚拟大小 原始数据大小 特征 熵(Entropy) .text 0x00001000 0x0000543a 0x00006000 IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 6.16 .rdata 0x00007000 0x00000e01 0x00001000 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 5.27 .data 0x00008000 0x0001b1bc 0x0001b000 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 6.41 .rsrc 0x00024000 0x00001480 0x00002000 IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 3.69 覆盖 偏移量: 0x00025000 大小: 0x00001e38 资源 名称 偏移量 大小 语言 子语言 熵(Entropy) 文件类型 RT_ICON 0x000243c0 0x000010a8 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 5.02 data RT_GROUP_ICON 0x00025468 0x00000014 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 1.78 MS Windows icon resource - 1 icon RT_VERSION 0x000240f0 0x000002d0 LANG_CHINESE SUBLANG_CHINESE_SIMPLIFIED 3.28 data 导入 库 KERNEL32.dll: • 0x407000 - HeapFree • 0x407004 - GetProcessHeap • 0x407008 - HeapAlloc • 0x40700c - HeapReAlloc • 0x407010 - Sleep • 0x407014 - VirtualAlloc • 0x407018 - VirtualProtect • 0x40701c - VirtualFree • 0x407020 - GetProcAddress • 0x407024 - LoadLibraryA • 0x407028 - IsBadReadPtr • 0x40702c - FreeLibrary • 0x407030 - WriteFile • 0x407034 - GetCommandLineA • 0x407038 - GetStringTypeA • 0x40703c - LCMapStringW • 0x407040 - LCMapStringA • 0x407044 - MultiByteToWideChar • 0x407048 - RtlUnwind • 0x40704c - RaiseException • 0x407050 - GetModuleHandleA • 0x407054 - GetStartupInfoA • 0x407058 - GetVersion • 0x40705c - ExitProcess • 0x407060 - SetUnhandledExceptionFilter • 0x407064 - TerminateProcess • 0x407068 - GetCurrentProcess • 0x40706c - UnhandledExceptionFilter • 0x407070 - GetModuleFileNameA • 0x407074 - FreeEnvironmentStringsA • 0x407078 - FreeEnvironmentStringsW • 0x40707c - WideCharToMultiByte • 0x407080 - GetEnvironmentStrings • 0x407084 - GetEnvironmentStringsW • 0x407088 - SetHandleCount • 0x40708c - GetStdHandle • 0x407090 - GetFileType • 0x407094 - GetEnvironmentVariableA • 0x407098 - GetVersionExA • 0x40709c - HeapDestroy • 0x4070a0 - HeapCreate • 0x4070a4 - IsBadWritePtr • 0x4070a8 - IsBadCodePtr • 0x4070ac - GetCPInfo • 0x4070b0 - GetACP • 0x4070b4 - GetOEMCP • 0x4070b8 - GetStringTypeW 库 USER32.dll: • 0x4070c0 - LoadCursorA • 0x4070c4 - wsprintfA • 0x4070c8 - LoadIconA 导出 序列 地址 名称 1 0x401c70 Ip 投放文件 kvrjlf.exe 文件名 kvrjlf.exe 相关文件 C:\ProgramData\Microsoft\Mxzwq\kvrjlf.exe 文件大小 159288 bytes 文件类型 PE32 executable (GUI) Intel 80386, for MS Windows MD5 fa4955c02390830b26e82cbae5ed66f6 SHA1 68b964e340cb29fb8c94e12a7bf0265e1085d581 SHA256 e110990a7f629e6c0f77ce1909a9ec0a9978f58f754975619bcdaa62b72c29c5 SHA512 4ed0663068126c941ee2eee363abd71520611e62f80bd806634207f3fce099f4046a961161f16877f78b094f72780a339ced3af44a02ca96deef26f572ea8207 Ssdeep 3072:AfPh6t5HWqv0yxmktUXoqRA8F2CfOgiI121a+FA:OE0AmktUXTFF2EOgV121j Yara 无匹配 VirusTotal 搜索相关分析 行为分析 互斥量(Mutexes) -mI\xe5\xb7\xa6,k??W\xe7\xa5\x89\xe5\xab\xbdm\xe6\x88\xaaf,\xe6\x84\xafj\x10/\xe9\xae\x98@s?Nu\xe9\x8a\xaet, DBWinMutex 执行的命令 C:\Windows\system32\cmd.exe /c @ping -n 5 127.0.0.1&del C:\Users\test\AppData\Local\Temp\server.exe > nul C:\ProgramData\Microsoft\Mxzwq\kvrjlf.exe C:\ProgramData\Microsoft\Mxzwq\kvrjlf.exe NewRunApp C:\Windows\system32\PING.EXE ping -n 5 127.0.0.1 创建的服务 Ghijkl Nopqrstu Wxy 启动的服务 Ghijkl Nopqrstu Wxy 进程 server.exe PID: 1960, 上一级进程 PID: 2152 services.exe kvrjlf.exe cmd.exe PID: 452, 上一级进程 PID: 356 PID: 1952, 上一级进程 PID: 452 PID: 792, 上一级进程 PID: 1960 PING.EXE PID: 2788, 上一级进程 PID: 792 kvrjlf.exe PID: 1832, 上一级进程 PID: 1952 访问的文件 C:\ProgramData\Microsoft\Mxzwq C:\Users\test\AppData\Local\Temp\server.exe C:\ProgramData\Microsoft\Mxzwq\kvrjlf.exe C:\Windows\Temp C:\Users\test\AppData\Local\Temp C:\Users C:\Users\test C:\Users\test\AppData C:\Users\test\AppData\Local C:\Users\test\AppData\Local\Temp\ping.* C:\Users\test\AppData\Local\Temp\ping C:\Windows\System32\ping.* C:\Windows\System32\PING.COM C:\Windows\System32\PING.EXE C:\Windows\Globalization\Sorting\sortdefault.nls \??\nul C:\ \??\Nsi 读取的文件 C:\Users\test\AppData\Local\Temp\server.exe C:\Windows\Globalization\Sorting\sortdefault.nls 修改的文件 C:\ProgramData\Microsoft\Mxzwq\kvrjlf.exe \??\nul 删除的文件 C:\Users\test\AppData\Local\Temp\server.exe 注册表键 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Ghijkl Nopqrstu Wxy HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ghijkl Nopqrstu Wxy\Description HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ghijkl Nopqrstu Wxy\MakeTime HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\GRE_Initialize HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ghijkl Nopqrstu Wxy HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ghijkl Nopqrstu Wxy\ObjectName HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ghijkl Nopqrstu Wxy\ImagePath HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ghijkl Nopqrstu Wxy\WOW64 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\ProfileList HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\ProgramData HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Public HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Environment HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Default HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir (x86) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir (x86) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramW6432Dir HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonW6432Dir HKEY_CURRENT_USER HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18\ProfileImagePath HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\AppData HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Local AppData HKEY_USERS\.DEFAULT\Environment HKEY_USERS\.DEFAULT\Volatile Environment HKEY_USERS\.DEFAULT\Volatile Environment\0 HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ghijkl Nopqrstu Wxy\Environment HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Windows HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Windows\NoInteractiveServices HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ProgramFilesDir HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\CommonFilesDir HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ProgramFilesDir (x86) HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\CommonFilesDir (x86) HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ProgramW6432Dir HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\CommonW6432Dir HKEY_USERS\S-1-5-18 HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\DisableUNCCheck HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\EnableExtensions HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\DelayedExpansion HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\DefaultColor HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\CompletionChar HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\PathCompletionChar HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\AutoRun HKEY_CURRENT_USER\Software\Microsoft\Command Processor HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DisableUNCCheck HKEY_CURRENT_USER\Software\Microsoft\Command Processor\EnableExtensions HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DelayedExpansion HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DefaultColor HKEY_CURRENT_USER\Software\Microsoft\Command Processor\CompletionChar HKEY_CURRENT_USER\Software\Microsoft\Command Processor\PathCompletionChar HKEY_CURRENT_USER\Software\Microsoft\Command Processor\AutoRun HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\Locale HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\Locale\Alternate Sorts HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Nls\Language Groups HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\Locale\00000804 HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\Language Groups\a HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\DefaultTTL HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\SQMClient\Windows HKEY_LOCAL_MACHINE\Software\Microsoft\SQMClient\Windows HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient\Windows\CEIPEnable HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Winsock\Parameters HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Winsock\Parameters\Transports HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip6\Parameters\Winsock HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\TCPIP6\Parameters\Winsock\Mapping HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Winsock HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\Winsock\Mapping HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Winsock\Setup Migration\Providers HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Winsock\Setup Migration\Providers\Tcpip HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Winsock\Setup Migration\Providers\Tcpip\WinSock 2.0 Provider ID HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\Winsock\MinSockaddrLength HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\Winsock\MaxSockaddrLength HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\Winsock\UseDelayedAcceptance HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\Winsock\HelperDllName 读取的注册表键 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\GRE_Initialize\DisableMetaFiles HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ghijkl Nopqrstu Wxy\ObjectName HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ghijkl Nopqrstu Wxy\ImagePath HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ghijkl Nopqrstu Wxy\WOW64 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\ProgramData HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Public HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\Default HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramFilesDir (x86) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonFilesDir (x86) HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ProgramW6432Dir HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\CommonW6432Dir HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-18\ProfileImagePath HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\AppData HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders\Local AppData HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ghijkl Nopqrstu Wxy\Environment HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Windows\NoInteractiveServices HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ProgramFilesDir HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\CommonFilesDir HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ProgramFilesDir (x86) HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\CommonFilesDir (x86) HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ProgramW6432Dir HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\CommonW6432Dir HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\DisableUNCCheck HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\EnableExtensions HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\DelayedExpansion HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\DefaultColor HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\CompletionChar HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\PathCompletionChar HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Command Processor\AutoRun HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DisableUNCCheck HKEY_CURRENT_USER\Software\Microsoft\Command Processor\EnableExtensions HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DelayedExpansion HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DefaultColor HKEY_CURRENT_USER\Software\Microsoft\Command Processor\CompletionChar HKEY_CURRENT_USER\Software\Microsoft\Command Processor\PathCompletionChar HKEY_CURRENT_USER\Software\Microsoft\Command Processor\AutoRun HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\Locale\00000804 HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Nls\Language Groups\a HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\DefaultTTL HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQMClient\Windows\CEIPEnable HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Winsock\Parameters\Transports HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\TCPIP6\Parameters\Winsock\Mapping HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\Winsock\Mapping HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Winsock\Setup Migration\Providers\Tcpip\WinSock 2.0 Provider ID HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\Winsock\MinSockaddrLength HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\Winsock\MaxSockaddrLength HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\Winsock\UseDelayedAcceptance HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Tcpip\Parameters\Winsock\HelperDllName 修改的注册表键 HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ghijkl Nopqrstu Wxy\Description HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Ghijkl Nopqrstu Wxy\MakeTime 删除的注册表键 无信息 API解析 msvcrt.dll._strupr msvcrt.dll._strnicmp msvcrt.dll._adjust_fdiv msvcrt.dll._initterm msvcrt.dll._beginthreadex msvcrt.dll.strncmp msvcrt.dll.strncat msvcrt.dll.strchr msvcrt.dll.fopen msvcrt.dll.fwrite msvcrt.dll.fclose msvcrt.dll.exit msvcrt.dll._mbsnbicmp msvcrt.dll.strrchr msvcrt.dll._iob msvcrt.dll.fprintf msvcrt.dll.strcat msvcrt.dll.clock msvcrt.dll.strcmp msvcrt.dll._local_unwind2 msvcrt.dll._except_handler3 msvcrt.dll.time msvcrt.dll.srand msvcrt.dll.printf msvcrt.dll.sprintf msvcrt.dll.strcspn msvcrt.dll.strncpy msvcrt.dll.atoi msvcrt.dll.rand msvcrt.dll.strcpy msvcrt.dll.memcmp msvcrt.dll.??2@YAPAXI@Z msvcrt.dll.memset msvcrt.dll.__CxxFrameHandler msvcrt.dll.free msvcrt.dll.malloc msvcrt.dll.strstr msvcrt.dll.strlen msvcrt.dll._ftol msvcrt.dll.ceil msvcrt.dll.memmove msvcrt.dll.memcpy msvcrt.dll.??3@YAXPAX@Z msvcrt.dll._strcmpi ws2_32.dll.#11 ws2_32.dll.WSAIoctl ws2_32.dll.#12 ws2_32.dll.#57 ws2_32.dll.#3 ws2_32.dll.#18 ws2_32.dll.#16 ws2_32.dll.#23 ws2_32.dll.#52 ws2_32.dll.#9 ws2_32.dll.#4 ws2_32.dll.#21 ws2_32.dll.#20 ws2_32.dll.#8 ws2_32.dll.#6 ws2_32.dll.#116 ws2_32.dll.#115 ws2_32.dll.WSASocketA ws2_32.dll.#19 user32.dll.OpenDesktopA user32.dll.GetThreadDesktop user32.dll.GetUserObjectInformationA user32.dll.OpenInputDesktop user32.dll.SetThreadDesktop user32.dll.CloseDesktop user32.dll.GetKeyState user32.dll.GetAsyncKeyState user32.dll.GetForegroundWindow user32.dll.ExitWindowsEx user32.dll.EnumWindows user32.dll.GetWindowTextA user32.dll.MessageBoxA user32.dll.wsprintfA ole32.dll.CoUninitialize ole32.dll.CoCreateInstance ole32.dll.CoInitialize oleaut32.dll.#6 kernel32.dll.TerminateThread kernel32.dll.Process32Next kernel32.dll.OpenProcess kernel32.dll.Process32First kernel32.dll.QueryDosDeviceA kernel32.dll.lstrcmpiA kernel32.dll.GetLogicalDriveStringsA kernel32.dll.TerminateProcess kernel32.dll.MoveFileExA kernel32.dll.MoveFileA kernel32.dll.GetTempPathA kernel32.dll.GetLongPathNameA kernel32.dll.GetCurrentProcess kernel32.dll.WriteFile kernel32.dll.SetFilePointer kernel32.dll.GetFileSize kernel32.dll.CreateFileA kernel32.dll.ReadFile kernel32.dll.GetSystemInfo kernel32.dll.GetModuleHandleA kernel32.dll.GlobalMemoryStatus kernel32.dll.GetVersionExA kernel32.dll.CreateDirectoryA kernel32.dll.CreateMutexA kernel32.dll.WinExec kernel32.dll.SetThreadPriority kernel32.dll.GetCurrentThread kernel32.dll.SetPriorityClass kernel32.dll.GetEnvironmentVariableA kernel32.dll.GetShortPathNameA kernel32.dll.OpenEventA kernel32.dll.SetFileAttributesA kernel32.dll.CopyFileA kernel32.dll.DefineDosDeviceA kernel32.dll.GetCurrentThreadId kernel32.dll.CreateToolhelp32Snapshot kernel32.dll.InitializeCriticalSection kernel32.dll.DeleteCriticalSection kernel32.dll.VirtualFree kernel32.dll.LeaveCriticalSection kernel32.dll.EnterCriticalSection kernel32.dll.VirtualAlloc kernel32.dll.CreateEventA kernel32.dll.CloseHandle kernel32.dll.WaitForSingleObject kernel32.dll.ResetEvent kernel32.dll.SetEvent kernel32.dll.InterlockedExchange kernel32.dll.CancelIo kernel32.dll.Sleep kernel32.dll.GetTickCount kernel32.dll.GetLocalTime kernel32.dll.OutputDebugStringA kernel32.dll.FreeLibrary kernel32.dll.GetProcAddress kernel32.dll.LoadLibraryA kernel32.dll.lstrcpyA kernel32.dll.lstrcatA kernel32.dll.GetSystemDirectoryA kernel32.dll.FileTimeToSystemTime kernel32.dll.GetSystemTime kernel32.dll.FindFirstFileA kernel32.dll.GetModuleFileNameA kernel32.dll.DeleteFileA kernel32.dll.GetWindowsDirectoryA kernel32.dll.LocalFree kernel32.dll.GetLastError kernel32.dll.HeapFree kernel32.dll.GetProcessHeap kernel32.dll.HeapAlloc kernel32.dll.HeapReAlloc kernel32.dll.VirtualProtect kernel32.dll.IsBadReadPtr kernel32.dll.GetFileAttributesA kernel32.dll.LocalSize kernel32.dll.LocalAlloc kernel32.dll.CreateProcessA kernel32.dll.GetStartupInfoA kernel32.dll.lstrlenA advapi32.dll.RegOpenKeyA advapi32.dll.RegQueryValueExA advapi32.dll.RegCreateKeyA advapi32.dll.RegSetValueExA advapi32.dll.RegCloseKey advapi32.dll.OpenSCManagerA advapi32.dll.OpenServiceA advapi32.dll.DeleteService advapi32.dll.CloseServiceHandle advapi32.dll.ChangeServiceConfig2A advapi32.dll.RegOpenKeyExA advapi32.dll.StartServiceA advapi32.dll.CreateServiceA advapi32.dll.CloseEventLog advapi32.dll.ClearEventLogA advapi32.dll.OpenEventLogA advapi32.dll.RegDeleteKeyA advapi32.dll.RegEnumKeyExA advapi32.dll.RegQueryValueA advapi32.dll.AdjustTokenPrivileges advapi32.dll.LookupPrivilegeValueA advapi32.dll.OpenProcessToken advapi32.dll.RegEnumValueA advapi32.dll.RegCreateKeyExA advapi32.dll.RegDeleteValueA advapi32.dll.CreateProcessAsUserA advapi32.dll.SetTokenInformation advapi32.dll.DuplicateTokenEx advapi32.dll.SetServiceStatus advapi32.dll.RegisterServiceCtrlHandlerA advapi32.dll.StartServiceCtrlDispatcherA advapi32.dll.UnlockServiceDatabase advapi32.dll.LockServiceDatabase iphlpapi.dll.GetIfTable iphlpapi.dll.GetAdaptersInfo wininet.dll.InternetReadFile wininet.dll.InternetOpenA wininet.dll.InternetOpenUrlA wininet.dll.InternetCloseHandle shell32.dll.SHGetSpecialFolderPathA shell32.dll.ShellExecuteA kernel32.dll.GetSystemTimes server.exe.Ip kvrjlf.exe.Ip kernel32.dll.WTSGetActiveConsoleSessionId wtsapi32.dll.WTSQueryUserToken winsta.dll.WinStationQueryInformationW advapi32.dll.LookupAccountSidW sechost.dll.LookupAccountSidLocalW advapi32.dll.CreateWellKnownSid rpcrt4.dll.RpcStringBindingComposeW rpcrt4.dll.RpcBindingFromStringBindingW rpcrt4.dll.RpcStringFreeW rpcrt4.dll.RpcBindingSetAuthInfoExW sechost.dll.LookupAccountNameLocalW rpcrt4.dll.NdrClientCall2 rpcrt4.dll.RpcBindingFree userenv.dll.CreateEnvironmentBlock sechost.dll.ConvertSidToStringSidW sspicli.dll.GetUserNameExW kernel32.dll.SetThreadUILanguage kernel32.dll.CopyFileExW kernel32.dll.IsDebuggerPresent kernel32.dll.SetConsoleInputExeNameW kernel32.dll.SortGetHandle kernel32.dll.SortCloseHandle mswsock.dll.WSPStartup wshtcpip.dll.WSHOpenSocket wshtcpip.dll.WSHOpenSocket2 wshtcpip.dll.WSHJoinLeaf wshtcpip.dll.WSHNotify wshtcpip.dll.WSHGetSocketInformation wshtcpip.dll.WSHSetSocketInformation wshtcpip.dll.WSHGetSockaddrType wshtcpip.dll.WSHGetWildcardSockaddr wshtcpip.dll.WSHGetBroadcastSockaddr wshtcpip.dll.WSHAddressToString wshtcpip.dll.WSHStringToAddress wshtcpip.dll.WSHIoctl ©2016 上海魔盾信息科技有限公司